1997-09-01 - Re: your mail

Header Data

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: 9a79bbcb9e8bb78b43dc3d552cc90df537ad981f33d2bfcf7f460628a26c6532
Message ID: <F84cce10w165w@bwalk.dm.com>
Reply To: <Pine.BSF.3.91.970901111126.16439D-100000@mcfeely.bsfs.org>
UTC Datetime: 1997-09-01 17:32:11 UTC
Raw Date: Tue, 2 Sep 1997 01:32:11 +0800

Raw message

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 2 Sep 1997 01:32:11 +0800
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <Pine.BSF.3.91.970901111126.16439D-100000@mcfeely.bsfs.org>
Message-ID: <F84cce10w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat <wombat@mcfeely.bsfs.org> writes:

> Based on what I've seen so far, the account numbers were more likely to
> have been obtained from the databases of merchants than from banks. If
> the bank was cracked, there would have been many more card numbers from
> one bank on the CD, rather than a distribution of account numbers issued
> by many institutions. I doubt that someone managed to crack a dozens of
> banks, and then took only a few thousand numbers from each. It is more
> likely that "widgets R us" was compromised, resulting in a few thousand
> accounts from each of the major banks.

A couple of years ago "hackers" got hold of the credit card numbers being
billed by panix.com, a (lousy) NYC ISP. of course that was much less3
than a hundred thousand cards :-)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






Thread